| Exploiting Embedded Systems - The Sequel! |
Barnaby Jack |
Presentation |
Paper |
| Unusual Car Navigation Tricks |
Andrea Barisani, Daniele Bianco |
Presentation |
- |
| Vista's Network Attack Surface |
Jim Hoagland |
- |
- |
| Vista Internals: User Account Control, Protected-Mode IE, and Bitlocker |
Mark Russinovich |
- |
- |
| RFID |
Adam Laurie |
Presentation |
- |
| Reverse Engineering Malicious Javascript |
Jose Nazario |
Presentation |
- |
| Other Wireless: New ways to get Pwned |
Luis Miras |
Presentation |
- |
| NGN - Next Generation Networks |
Nicolas Fischbach |
Presentation |
- |
| Wii Control You |
Marcel Holtmann |
- |
- |
| Playing with ActiveX controls |
Su Yong Kim, Do Hoon Lee |
- |
- |
| Good and Bad Uses of Vulnerability Data |
Ron Gula |
Presentation |
- |
| A Network Analysis Manifold |
Michael Geide |
Presentation |
- |
| Fun with IPv6 routing headers |
Philippe Biondi, Arnaud Ebalard |
Presentation |
- |
| Live Free or Hack Hard - Metasploit 2007 |
HD Moore |
Presentation |
- |
| Post-Mortem RAM Forensics |
Tim Vidas |
Presentation |
- |
| I know what you (and your company) did last summer... |
Roelof Temmingh |
Presentation |
- |
| Black Box Analysis and Attacks of Nortel VoIP Implementations |
Richard Gowman, Eldon Sprickerhoff |
Presentation |
Source |
| Smashing Web Apps: Applying Fuzzing to Web Applications and Web Services |
Michael Sutton |
- |
- |
| Low-Rate Denial-of-Service attacks |
V. Anil Kumar |
- |
- |
| Unusual bugs |
Ilja van Sprundel |
- |
- |
| An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments |
Tavis Ormandy |
- |
- |
| ScarabMon: Automating Web Application Pentests |
Jonathan Wilkins |
- |
- |